Assignments- Big data , Text processing

1.Write at least 500 words in APA format discussing how to use sentiment analysis how political speech affects voters. Use at least 3 references in APA format.

2.Read the below article(link below) on statistics for categorical variables. Write at least 500 words in APA format discussing how to use these statistics to help understand big data. 

 Link: https://uc-r.github.io/descriptives_categorical

The New Plays Repertory

  

The New Plays Repertory Theater would like to computerize its ticket sales. The theater seats 500 people, offers seven plays each year, and sells season tickets and single-night tickets. The season tickets are all for performances at the same time during the week. Each play has 20 performances. The theater keeps a customer list of those people who buy tickets in order to send play information for advertising purposes.
 

The reports they would like to create are:
 

A listing of available seats
A listing of all plays and the actors in the plays
A listing of customers
Labels printed for all customers
A listing of season ticket holders
Plan an RDBMS for this problem. Include the following forms:
 

1. List of Reports
 

2. Report Layout Form
 

3. Schema
 

4. Table Characteristics
 

5. Query Design Form

Assignment

Lab 4 of INT 2240

 

  • Lab FOUR-01
    • Visit the following site:
    • Module 2:Problem Statement:  2.3.1.18 Your own split method================================================================================================Submit your Python solution  as explained below.
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script to simulate Python’s split() method
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s).==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FOUR-01) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FOUR-01
    4. Locate your Python program (Lab FOUR-01 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentLab FOUR-02
    • Visit the following site:
    • Module 2:Problem Statement:  2.3.1.18 Your own capitalize ()  ================================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script to simulate Python’s capitalize() method
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)=========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FOUR-02) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FOUR-02
    4. Locate your Python program (Lab FOUR-02 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================

Discussion Response 300 words and 2 references.

Please review below post and provide a response to this: 

Poorly Implemented Database

Poorly designed or produced databases include incomplete information in various rows, ambiguity or uncertainty, complex and often invasive attempts, and uncertain information in the database. A poorly constructed dataset is inefficient, demanding, and maintenance-oriented, and it cannot address the actual working circumstances. Any organization has a significant database since it contains all information about the company, its suppliers, and its customers. The database design varies depending on the company’s strategy (Badia, 2015).

My office is a poorly implemented database that I joined. I worked with such a health company in which we recognized a customized platform in the sector as a monster. Some of Monster’s data have been deleted and are static stable. Significant data instability and preprocessing conclusion. It will contain extensive catalog interfaces and programs that effectively create zero logical information and mission descriptions. Monster files have several important issues, which appear to be the product of poorly planned manufacturing choices (Kraleva et al., 2018).

As a project for additional risks, several movements are required. A unique software attack method is present in the Monster archive, and programming occurrences are compared. The firm may market a local consumer brand as a viable alternative. For a week, the few intentionally eligible sellers have assessed the significant shift, together with a bargaining explanation statement that they created a year ago. The database generally includes changing the data found in system changes and is designed to work without compromising the program’s fundamental functioning over time as technology changes. The system controller controls a wide variety of technological initiatives in companies. The deliberate regulation is measured as a safety concern (Malik & Patel, 2016).  

References

Badia, G. (2015). Multiple Databases are Needed to Search the Journal Literature on Computer Science. Evidence Based Library and Information Practice, 10(4), 241. https://doi.org/10.18438/b8p31c

Kraleva, R. S., Kralev, V. S., Sinyagina, N., Koprinkova-Hristova, P., & Bocheva, N. (2018). Design and Analysis of a Relational Database for Behavioral Experiments Data Processing. International Journal of Online Engineering (IJOE), 14(02), 117. https://doi.org/10.3991/ijoe.v14i02.7988

Malik, M., & Patel, T. (2016). Database Security – Attacks and Control Methods. International Journal of Information Sciences and Techniques, 6(1/2), 175–183. https://doi.org/10.5121/ijist.2016.6218

Project 6: Global Approaches to Cybersecurity Step 13: Compose Global Cybersecurity Environment Report

Project 6: Global Approaches to Cybersecurity
Step 13: Compose Global Cybersecurity Environment Report

 

Throughout this project, you have researched and considered global cybersecurity issues, technologies, and related policies. You have evaluated various countries and international organizations. It is now time to compose your consultant’s report to GlobalOutreach documenting your findings. Refer to the instruction for the Global Cybersecurity Environment Report for additional guidelines.

Submit your completed report.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 7.2: Evaluate international cybersecurity policy.
  • 8.2: Evaluate specific cybersecurity threats and the combination of technologies and policies that can address them.

 

Instruction for the Global Cybersecurity Environment Report

Review the work you have done throughout the project. If necessary, review the eLearning modules in steps 6 and 9 and your Simtray Report completed in Step 3 along with the feedback from your instructor.

Be sure to address the following items at some point in your report.

  • Analyze critical issues in global cybersecurity management and policy.
  • Analyze critical issues in global cybersecurity technology policy.
  • Analyze the principles of warfare that underpin cyberwarfare theory and application.
  • Assess cybersecurity policies and procedures for transnational legal compliance.
  • Compare and contrast international cybersecurity standards bodies.
  • Identify key initiatives in international cybersecurity policy.
  • Assess the cross-cutting effects of policy, budget, and technological capabilities upon the ability to address cyberthreats at the enterprise, national, and international levels.
  • Assess policy and technology trade-offs that must be considered and made when addressing cyberthreats at the enterprise, national, and international levels.
  • Assess and critique cybersecurity programs.
  • Assess emerging cybersecurity issues, risks, and vulnerabilities.
  • Assess key cyberattack technologies.
  • Assess how the theories and principles of war apply to cyberwarfare, and apply those theories to understand cyberoffense and cyberdefense challenges.

Report Sections

  • Title Page
  • Table of Contents
  • Introduction
  • International Cybersecurity Threat Matrix
  • International Environmental Scan
  • Regional Cybersecurity Threat Fact Sheet
  • Botnet Evaluation
  • Botnet Discussion
  • Botnet Conclusion
  • Conclusion
  • Reference Page

Discussion 300 words

 Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals. 

5/3 Assignment

  1. Phase 3 of Final Project: Write a two- to four-page paper that addresses and reflects upon the following:
    1. Describe the concepts and practices of designing and implementing business continuity and disaster recovery plan.
    2. How might you test a disaster recovery plan?
    3. What should a risk management plan include?
    4. How does a change management plan impact the overall risk strategy?
    5. What are the important concepts that should be included in a security plan for developing secure software?
  2. Support your writing with at least two outside sources. The paper should be in APA format.
  3. This is the 3rd part to be submitted; please look at the previous 2 parts.